23.12.2012 Views

Digital Forensics in Small Devices: RFID Tag Investigation

Digital Forensics in Small Devices: RFID Tag Investigation

Digital Forensics in Small Devices: RFID Tag Investigation

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

6.0 INTRODUCTION<br />

Chapter 6 -<br />

Conclusion<br />

The significant gap <strong>in</strong> the digital forensics research relat<strong>in</strong>g to commercial <strong>RFID</strong><br />

bus<strong>in</strong>ess system (<strong>RFID</strong> BS) tools and professional procedures was noted <strong>in</strong><br />

Chapter 1. The relevant literature was reviewed <strong>in</strong> Chapter 2, <strong>in</strong>clud<strong>in</strong>g the three-<br />

tier model of a <strong>RFID</strong> system (Section 2.1, Section 2.2, and Section 2.3), the<br />

challenges and <strong>RFID</strong> security threats (Section 2.4). A summary was made of the<br />

relevant issues and problems (Section 2.7), notably that wireless <strong>RFID</strong> enabled<br />

systems are susceptible to malicious attacks. In Chapter 3, a researchable problem<br />

and question were identified (Section 3.2.6 and Section 3.2.7) and a plausible<br />

research methodology specified (Section 3.3 and Section 3.4).<br />

Then, a prototype of a commercial retail environment us<strong>in</strong>g a <strong>RFID</strong> stock<br />

management system was set up <strong>in</strong> the laboratory and customized <strong>RFID</strong><br />

middleware (Appendix 4) was developed by us<strong>in</strong>g a Software Development Kit<br />

(SDK) of a <strong>RFID</strong> reader manufactur<strong>in</strong>g company to help the requirements of the<br />

system design set up. Subsequently, the stabilized <strong>RFID</strong> BS (Section 3.3.1) was<br />

stressed by a SQL poison<strong>in</strong>g attack through a <strong>RFID</strong> tag as part of the data<br />

generation before perform<strong>in</strong>g the digital forensic <strong>in</strong>vestigation as stated <strong>in</strong> Section<br />

3.2.1. Hence, the attack was replicated by review<strong>in</strong>g the previous literature<br />

(Section 3.1.2). Likewise, the ReaderLogExtractionTool (Appendix 3) was<br />

created to acquire bit-to-bit logs from the <strong>RFID</strong> reader’s memory and to develop<br />

the customized Helix_<strong>RFID</strong>_IR toolkit (Appendix 2) before the forensic<br />

<strong>in</strong>vestigation was <strong>in</strong>itiated. Then, the compromised <strong>RFID</strong> BS was <strong>in</strong>vestigated.<br />

The evidential search was performed <strong>in</strong> each of the entities of the <strong>RFID</strong> BS (Table<br />

2.5 <strong>in</strong> Section 2.3) by us<strong>in</strong>g a Helix_<strong>RFID</strong>_IR toolkit. Hence, the f<strong>in</strong>d<strong>in</strong>gs of the<br />

research were presented, analysed and discussed <strong>in</strong> Chapter 4 and Chapter 5<br />

respectively.<br />

In order to conclude this research project, the follow<strong>in</strong>g sections are<br />

<strong>in</strong>cluded. Section 6.1 is a summary of f<strong>in</strong>d<strong>in</strong>gs from the research conducted and<br />

152

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!